作者: Arun K. Kanuparthi , Ramesh Karri , Gaston Ormazabal , Sateesh K. Addepalli
关键词:
摘要: The number of attacks on embedded processors is the rise. Attackers exploit vulnerabilities in software to launch new and get unauthorized access sensitive information stored these devices. Several solutions have been proposed by both academia industry protect programs running embedded-processor based computer systems. After a description several that threaten system, this paper surveys existing defenses - software-based hardware-based (watchdog checkers, integrity trees, memory encryption, modification processor architecture), against such attacks. This also provides comparative discussion their advantages disadvantages.